Research

  • Managing Risks and Attack Paths in Business Applications
  • Leveraging AI and Machine Learning for Threat Detection
  • SAP Forensics
  • Designing Secure Financial Infrastructures
  • Automating Information Security Decision Making Using Artificial Intelligence

Conferences/Talks

  • 06.11.2019 European Commission – EU-CERT (Brussels, Belgium) Detecting Attacks on Business Applications Using Machine Learning and AI
  • 05.09.2018 European Commission – EU-CERT (Brussels, Belgium) Hacking the Government Through Business Processes
  • 27.01.2017 European Commission (Brussels, Belgium) Protecting vulnerability disclosure
  • 21.09.2016 SAP German User Group Annual Congress (DSAG) (Nürnberg, Germany) How to steal a million dollars and get away with it
  • 16.09.2015 GCC Cyber Security Summit (Abu Dhabi, U.A.E.) Protecting your business from Cyber Attacks
  • 04.09.2015 HP Protect (Washington D.C., U.S.) SAP Security: How to steal a million dollars and get away with it
  • 08.06.2015 Hack In Paris (Paris, France) SAP Security: Attacks to Business Processes
  • 06.08.2014 BlackHat (Las Vegas, USA) SAP, Credit Cards and The Bird That Talks Too Much
  • 18.03.2015 Troopers (Heidelberg, Germany) SAP, Credit Cards and The Bird That Talks Too Much
  • 27.03.2014 BlackHat (Singapore) SAP Security: Attacks to Business Processes
  • 30.10.2013 SAP Product Security Summit (Walldorf/Germany) Manipulating the business processes for fun and profit
  • 19.07.2012 Integralis Secure World  (Stuttgart/Germany) Hack Proofing SAP Systems
  • 13.10.2012 SAP Product Security Summit (Walldorf/Germany) Attacking SAP Systems. Why, How, Who and How do we prevent?
  • 20.07.2012 Integralis Secure World (Stuttgart/Germany) Attacking SAP Systems Through ABAP applications
  • 27.04.2012 Daimler Security Summit (Stuttgart/Germany) SAP Penetration Testing
  • 25.03.2011 SAP Internal (Walldorf/Germany) SAP Security
  • 16.05.2011 ITM/S Global Information Security (Stuttgart/Germany) Common Attacks to SAP Systems
  • 28.06.2011 Integralis Secure World (Stuttgart/Germany) How to attack an SAP System
  • 08.09.2011 Sec-T (Stockholm/Sweden) SAP Security
  • 17.09.2011 Hacktivity (Budapest/Hungary) Rootkits and Trojans on Your SAP Landscape
  • 05.11.2011 Defcon (Lucerne/Switzerland) Enterprise Security
  • 07.10.2010 Secude Security Forum (Regensburg/Switzerland) SAP Security
  • 13.10.2010 RISK (Oslo/Norway) SAP Security and Sensitive Information
  • 04.11.2010 Defcon (Lucerne/Switzerland) The Truth about ABAP Security
  • 17.11.2010 DOAG (Nuernberg/Germany) SAP Password Security
  • 27.12.2010 CCC (Berlin/Germany) Rootkits and Trojans on your SAP Landscape

Papers

Slides

Security Advisories: